IPSEC site to site VPN with loopback interface issue

From: Sarad <tosara_at_gmail.com>
Date: Thu, 3 Nov 2011 18:00:35 +1100

Hi Guys,

I am trying to set up a IPSEC site to site VPN with multiple end point at
the head end. To do that I should be able to terminate these VPN on a
loopback address, I tried configring it the loopback but eventhough tunnel
set up correctly no traffic go throgh the tunnel. But when I change it back
to a phisical interface it works without any issue with the same
configuration.

*Head end config*
**

hostname TEST_VPN_ASR
!
aaa new-model
!
!
aaa authentication login userauthen local
aaa authorization network groupauthor local
!
!
!
!
!
aaa session-id common
!
!
!
!
crypto keyring L2L_A
  pre-shared-key address 20.1.1.2 key test123
!
crypto isakmp policy 1
 encr 3des
 authentication pre-share
 group 2

crypto isakmp profile L2L_A
   keyring L2L_A
   match identity address 20.1.1.2 255.255.255.255
   local-address Loopback0
!
!
crypto ipsec transform-set Tra_L2L_A esp-3des esp-sha-hmac
!
crypto map crypmap 1 ipsec-isakmp
 set peer 20.1.1.2
 set transform-set Tra_L2L_A
 set isakmp-profile L2L_A
 match address 101
 reverse-route
!
!
!
!
!
interface Loopback0
 ip address 10.1.1.1 255.255.255.248
 crypto map crypmap
!
interface Loopback1
 ip address 10.1.1.9 255.255.255.248
!
interface Loopback2
 ip address 10.1.1.17 255.255.255.248
!
interface Loopback100
 ip address 200.200.200.200 255.255.255.0
!
!
interface GigabitEthernet0/0/0.100
 description #### Global Internet ####
 encapsulation dot1Q 100
 ip address 10.2.2.1 255.255.255.0
 crypto map crypmap
!
!
router eigrp 100
 network 10.0.0.0
!
ip route 0.0.0.0 0.0.0.0 10.2.2.2
!
logging esm config
access-list 101 permit ip 200.200.200.0 0.0.0.255 210.210.210.0 0.0.0.255
access-list 101 permit ip 192.168.0.0 0.0.255.255 any
!
!
!
Cheers
Sara

Blogs and organic groups at http://www.ccie.net
Received on Thu Nov 03 2011 - 18:00:35 ART

This archive was generated by hypermail 2.2.0 : Thu Dec 01 2011 - 06:29:31 ART